Type: pilfer date trojan
Harm: Enter the user's computer through various Trojan downloaders, steal the account and password information of many popular online games such as Dungeon and Warriors, World of Warcraft, Legendary World, etc., and also take screenshots of the victim's computer, steal the picture documents and text documents stored by the user on the computer, thus cracking the game security card and sending these sensitive information to the server or mailbox designated in the background.
Annual cumulative killing amount of 360 security guards: 152509 102.
Second, the Niu Ben downloader
Type: Trojan downloader
Hazard: The "Bull" that broke out in the Spring Festival of the Year of the Ox can be called the most harmful malware in the whole year. On the basis of hijacking dll files and infecting all kinds of compressed files, it integrates the web page file "Panda Burning Incense", network Trojan horse attack, LAN ARP attack and other communication means. In addition to automatically updating Disk Drive, AV Terminator forcibly closing panel controls and Robot Dog.
The cumulative number of 360 security guards killed in the whole year: 1 19995842.
Third, IE home page robbers
Type: advertising Trojan horse
Hazard: Rogue IE home page robbers were particularly active in 2009. The number and infected users of this kind of advertising Trojans even approach the online game pilfer date trojan, and their behaviors are highly consistent, that is, forcibly modifying IE browser homepage to designated websites and generating malicious browser shortcuts on computer desktops. There are many ways for bandits to spread on IE homepage. Some intrude into netizens' computers through Trojan downloaders, and some bundle the software, videos and other resources provided by bad websites, and even bundle the installation files of large-scale games, and download and spread them through BT.
360 security guards' annual cumulative killing volume: 100 1609 13.
Fourth, folder imitators.
Type: USB flash drive Trojan horse
Hazard: This is a Trojan horse program spread through mobile storage media such as USB flash drive. It is usually a functional component created by Trojan downloader to spread Trojans. It is especially common in places such as print shops where USB flash drives are often used, and there are also many infected student users. A folder imitator will disguise himself as a folder in a USB flash drive and set the normal folder as "hidden", thus deceiving users to click. In this way, even if the user prohibits the automatic play of the U disk, the folder imitator can still run and infect its mother Trojan downloader to other disks of the computer.
360 security guards' annual cumulative killing volume: 777 19535.
Five, the secret security nemesis of Warcraft
Type: pilfer date trojan
Danger: This kind of pilfer date trojan disguises himself as a running program of the game. For the popular online game World of Warcraft, the secret security nemesis of World of Warcraft will rename the real wow.exe and set it as a hidden file, but Trojan Horse is openly presented to players under the name of wow.exe. If the player doesn't pay attention to the Trojan horse, even if the password protection card is bound to the account, the game character will still be stolen.
360 security guards' cumulative killing volume throughout the year: 73,583,440 times.
Vi. Gh0st Broiler Program
Type: remote control Trojan horse
Hazard: In 2009, Gh0st replaced gray pigeons as the most mainstream hacking tool for broiler control. Since Trojan opened its source, various modified versions and variants have emerged one after another. Similar to Grey Pigeon, Gh0st can also monitor the computer screen of the victim user, record the keyboard operation, view and steal the information of the recruited user at will, and even automatically turn on the camera on the user's computer to take candid photos.
Cumulative killing volume of 360 security guards throughout the year: 52 150554 times.
Seven, "mare" downloader
Type: Trojan downloader
Hazard: The "mare" downloader appeared in June 5438+1October 2009 adopted the "robot dog" penetrating reduction technology. Infected system files can be automatically started, can penetrate freezing point, shadow and other system recovery software, and have stronger self-renewal and mutation ability: even if the same mare sample is run, the infected system files will change differently, and the infection mode and characteristics will also change accordingly. What's more, "Marley" is good at automatically breeding thousands of Trojan horses, hiding the main process files in them, thus avoiding security software and downloading a large number of pilfer date trojan and risk programs.
Cumulative annual killing volume of 360 security guards: 24,550,339
Viii. QQ Message Trojan Plug-in
Type: fraudulent program
Danger: This kind of fraudulent program occurred in the first half of 2009, and it usually intrudes into netizens' computers by hanging horses and downloading Trojans. It will hide the real QQ icon in the lower right corner of the desktop, and then forge itself into a flashing QQ message. When the victim clicks on the message, a window will pop up to promote the phishing website of the winning message, thus defrauding the victim of money in the name of deposit and handling fee.
Cumulative annual killing volume of 360 security guards: 20287859
Nine, "Shanzhai Panda" downloader
Type: Trojan downloader
Danger: The behavioral characteristics of "Shanzhai Panda" are closest to the once rampant "Panda Burning Incense". Will be completely infected with exe executable files, which is extremely destructive to the victim's computer system. Once running, it will occupy a lot of CPU resources, and may even lead to computer system crash. Some antivirus manufacturers also named "Shanzhai Panda" as "BMW Downloader".
Annual cumulative killing amount of 360 security guards: 1820 1728.
Ten, "licensed killer" downloader
Type: Trojan downloader
Hazard: Troy, which was the most harmful at the end of 2009. Using real digital signature for the first time to achieve "kill-free" can break through the protection of almost all anti-virus software, and at the same time, it can achieve forced second startup by infecting common software such as QQ and Thunder, which has unprecedented "kill-free" ability and super hidden survival ability. "Licensed killers" can't enter the annual top ten Trojan horses list simply by the number of kills, but the use of real and effective digital signatures on Trojans has undoubtedly sounded the alarm for the security industry, even more worthy of people's vigilance than stubborn Trojans such as cattle and horses.
Annual cumulative killing amount of 360 security guards: 1375 166.